Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Resilient consensus protocol in the presence of trusted nodes
Submitted by willirn1 on Thu, 05/30/2019 - 2:51pm
resilience
Vanderbilt
dominating set
adversary
graph robustness
Consensus
Buildings
Tree graphs
Topology
network topology
network theory (graphs)
Robustness
Protocols
connected dominating set
adversarial attacks
nonlocal information access
resilient distributed consensus problem
trusted nodes notion
resilient consensus protocol
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole amp;Grayhole Attacks
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
Grayhole
Trust Routing
wormhole attacks
Wormhole
RPL protocol
open standard routing protocol
network traffic
network topology
loT
light weight Trust based mechanism
IoT routing protocol RPL
Indirect Trust
Grayhole attacks
RPL
direct trust
telecommunication traffic
trust
Routing
Routing protocols
composability
pubcrawl
Resiliency
security
Internet of Things
Scalability
computer network security
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks
biblio
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
Routing
WSN
wireless sensor networks
Wireless Sensor Network
Wireless communication
urban power industry
telecommunication security
telecommunication network topology
telecommunication network reliability
smart power grids
smart power grid
Smart Grids
Smart Grid Sensors
sensor fusion
routing security
Routing protocols
Big Data
Resiliency
resilience
pubcrawl
power system security
power system reliability
plane routing protocol
node information security
network topology
multiparty data fusion algorithm
Human Factors
Human behavior
data fusion technology
Compositionality
clustering routing protocol
cluster routing protocol
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
biblio
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks
Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
physical attack mask
unobservable state-and-topology
two-stage optimization problem
two-stage optimization
Transmission line measurements
topology data
Topology
sub-network
state estimation
power systems
power system security
power system reliability
physical system consequences
Cyber-physical attacks
optimization
optimisation
Noise measurement
network topology
line outages
line failures
limited attack resources
false data injection attack
energy management
cyber-physical systems
cyber-physical system
1449080
biblio
Research on modeling for network security policy confliction based on network topology
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
network topology
telecommunication security
telecommunication network topology
security policy model
security policies
security
Routing
pubcrawl
Protocols
Policy consistency
Peer-to-peer computing
campus network
network security policy confliction
network security field
network modeling
network devices
IP networks
graph theory
distributed network system
Conflict checking
Communication networks
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »